본문 바로가기

김태훈 (Tai-hoon Kim)

소속기관
한양대학교
소속부서
멀티미디어학부
직급
조교수
ORCID
-
연구경력
-

주요 연구분야

  • 공학 > 전기/제어계측공학
  • 공학 > 전자/정보통신공학

저자의 논문 현황

연도별 상세보기를 클릭하시면 연도별 이용수·피인용수 상세 현황을 확인하실 수 있습니다.
피인용수는 저자의 논문이 DBpia 내 인용된 횟수이며, 실제 인용된 횟수보다 적을 수 있습니다.
  • 논문수57
  • 발행기간2007 ~ 2012
  • 이용수2,209
  • 피인용수0

논문제목를 인용한 논문목록입니다.

  • 피인용 논문 제목
    • 피인용 논문 저자
게시판 목록
논문명 저널명 발행연도 이용수 피인용수
확장된 다권선 변압기를 이용한 모듈화된 배터리 셀 전압 균등화 회로 전력전자학회 학술대회 논문집 2012 62 0
Magnetic Resonance Imaging for Brain Tumor Detection Proceedings of KIIT Conference 2011 44 0
Network-based Public Key Method for Steganography under RSA Cryptographic Assumptions Proceedings of KIIT Conference 2011 41 0
Hiding sensitive information in JPEG Proceedings of KIIT Conference 2011 37 0
Human Ubiquitous Healthcare System Based on IPv6 for Location Based Service Proceedings of KIIT Conference 2011 37 0
DFT processing for Image Data Hiding Proceedings of KIIT Conference 2011 21 0
Identification of Abnormal Masses in Digital Mammography Images Proceedings of KIIT Conference 2011 18 0
Signature Authentication Scheme based on Statistical Analysis Proceedings of KIIT Conference 2011 18 0
SMS-Based Broadcasting System Model Proceedings of KIIT Conference 2011 16 0
A Proposed Architecture for SCADA System with Mobile Sensors 한국정보기술학회논문지 2010 113 0
Secure SCADA Network Technology and Methods Proceedings of KIIT Conference 2010 91 0
Communication Security solution for internet SCADA Proceedings of KIIT Conference 2010 58 0
Reverse DNS lookup in MIPv6 Environment Proceedings of KIIT Conference 2010 36 0
Anti-Collision Protocol to The Susceptible Radio Frequency Identification Networks Proceedings of KIIT Conference 2010 32 0
Penetration Testing in Internet Protocol Proceedings of KIIT Conference 2010 29 0
Secure Power Control System Network Proceedings of KIIT Conference 2010 27 0
Application of The Next-Generation Internet Protocol in System Control and Data Aquisition Proceedings of KIIT Conference 2010 17 0
Dual Weather Information gathering in Internet SCADA Proceedings of KIIT Conference 2010 13 0
Countermeasures of Defenseless Ubiquitous Computing Environment towards Security Threats Proceedings of KIIT Conference 2010 9 0
Application Possibility of Asymmetric-key Encryption to SCADA Security 한국정보기술학회논문지 2009 122 0
더보기